Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: ComTrade LLC

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspambots
10/07/2019-02:51:32.067939 45.136.109.199 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-07 15:19:57
attackspam
Port scan: Attack repeated for 24 hours
2019-10-06 02:43:03
attackbots
10/03/2019-13:41:59.424376 45.136.109.199 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-04 02:46:36
attack
firewall-block, port(s): 6859/tcp, 7216/tcp
2019-10-01 16:47:22
attackbotsspam
09/26/2019-05:13:15.728101 45.136.109.199 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-26 17:28:18
Comments on same subnet:
IP Type Details Datetime
45.136.109.219 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 6000 proto: tcp cat: Misc Attackbytes: 60
2020-08-19 23:39:13
45.136.109.219 attackspam
slow and persistent scanner
2020-08-17 20:34:11
45.136.109.251 attackbotsspam
Port scanning [3 denied]
2020-08-14 14:18:15
45.136.109.219 attackbots
 TCP (SYN) 45.136.109.219:50230 -> port 53, len 44
2020-08-07 08:11:38
45.136.109.219 attackbotsspam
[Tue Aug 04 17:47:28 2020] - DDoS Attack From IP: 45.136.109.219 Port: 41096
2020-08-06 18:31:50
45.136.109.219 attack
 TCP (SYN) 45.136.109.219:43869 -> port 53, len 44
2020-08-05 23:34:34
45.136.109.158 attack
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 3389
2020-07-22 15:39:59
45.136.109.87 attack
BruteForce RDP attempts from 45.136.109.175
2020-07-17 14:21:12
45.136.109.158 attack
SmallBizIT.US 2 packets to tcp(3389,3391)
2020-07-07 12:28:14
45.136.109.158 attackbots
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 4489 [T]
2020-07-05 22:47:55
45.136.109.175 attackspambots
Icarus honeypot on github
2020-07-02 08:25:18
45.136.109.251 attackbots
Multiport scan : 15 ports scanned 2888 3381 3382 3402 3420 3501 3502 4003 4018 5909 7926 8093 9000 9261 9833
2020-06-21 07:47:48
45.136.109.219 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 6389 proto: TCP cat: Misc Attack
2020-06-06 08:47:05
45.136.109.222 attackspam
Mar 22 03:57:09 src: 45.136.109.222 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-22 12:01:46
45.136.109.222 attackbotsspam
Mar 18 22:14:16 src: 45.136.109.222 signature match: "BACKDOOR Subseven connection attempt" (sid: 100207) tcp port: 27374
2020-03-19 06:22:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.136.109.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.136.109.199.			IN	A

;; AUTHORITY SECTION:
.			223	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092600 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 26 17:28:15 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 199.109.136.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.109.136.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.183.99.137 attack
Dec  3 13:55:42 mercury smtpd[1197]: 239b439b90690e73 smtp event=failed-command address=180.183.99.137 host=mx-ll-180.183.99-137.dynamic.3bb.co.th command="AUTH PLAIN (...)" result="535 Authentication failed"
...
2020-03-03 23:11:13
112.218.29.190 attackspambots
Mar  3 13:24:16 sigma sshd\[1633\]: Invalid user ubnt from 112.218.29.190Mar  3 13:24:18 sigma sshd\[1633\]: Failed password for invalid user ubnt from 112.218.29.190 port 4106 ssh2
...
2020-03-03 23:41:06
107.180.111.13 attackspambots
Automatic report - XMLRPC Attack
2020-03-03 23:32:25
45.55.155.224 attack
Mar  3 16:14:08 vps647732 sshd[24748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.224
Mar  3 16:14:10 vps647732 sshd[24748]: Failed password for invalid user daniel from 45.55.155.224 port 35613 ssh2
...
2020-03-03 23:24:57
107.191.56.63 attack
suspicious action Tue, 03 Mar 2020 10:24:18 -0300
2020-03-03 23:43:00
190.203.44.111 attackspambots
20/3/3@08:24:36: FAIL: Alarm-Network address from=190.203.44.111
...
2020-03-03 23:02:37
103.58.116.118 attackspambots
Feb 11 18:49:06 mercury wordpress(www.learnargentinianspanish.com)[10828]: XML-RPC authentication failure for josh from 103.58.116.118
...
2020-03-03 23:31:20
128.199.210.98 attackbotsspam
Mar  3 15:19:59 MK-Soft-Root1 sshd[16908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.98 
Mar  3 15:20:01 MK-Soft-Root1 sshd[16908]: Failed password for invalid user sftpuser from 128.199.210.98 port 55524 ssh2
...
2020-03-03 23:45:11
203.253.255.73 attack
SSH Brute-Force reported by Fail2Ban
2020-03-03 23:44:19
210.48.146.61 attack
Mar  2 16:28:06 django sshd[127889]: reveeclipse mapping checking getaddrinfo for pulistsouias.us [210.48.146.61] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  2 16:28:06 django sshd[127889]: Invalid user ftpuser from 210.48.146.61
Mar  2 16:28:06 django sshd[127889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61 
Mar  2 16:28:08 django sshd[127889]: Failed password for invalid user ftpuser from 210.48.146.61 port 54022 ssh2
Mar  2 16:28:08 django sshd[127890]: Received disconnect from 210.48.146.61: 11: Normal Shutdown
Mar  2 16:32:01 django sshd[128142]: reveeclipse mapping checking getaddrinfo for pulistsouias.us [210.48.146.61] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  2 16:32:01 django sshd[128142]: Invalid user www from 210.48.146.61
Mar  2 16:32:01 django sshd[128142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61 


........
-----------------------------------------------
https://www.blocklist.de/
2020-03-03 23:10:40
141.98.81.38 attack
Mar  3 16:13:54 vpn01 sshd[1031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.38
Mar  3 16:13:56 vpn01 sshd[1031]: Failed password for invalid user ubnt from 141.98.81.38 port 32925 ssh2
...
2020-03-03 23:28:38
47.216.40.109 spamproxynormal
This IP address has been trying to hack me PlayStation as well as my epic games account for the last few months, I put a code on my epic games account and received notice that this IP address was attempting to log into my account
2020-03-03 23:43:29
222.186.180.8 attackspam
Mar  3 16:19:11 server sshd[881928]: Failed none for root from 222.186.180.8 port 56334 ssh2
Mar  3 16:19:14 server sshd[881928]: Failed password for root from 222.186.180.8 port 56334 ssh2
Mar  3 16:19:19 server sshd[881928]: Failed password for root from 222.186.180.8 port 56334 ssh2
2020-03-03 23:20:18
103.78.80.194 attack
Dec 23 08:04:13 mercury wordpress(www.learnargentinianspanish.com)[11906]: XML-RPC authentication failure for josh from 103.78.80.194
...
2020-03-03 23:00:05
187.176.43.128 attackspam
Automatic report - Port Scan Attack
2020-03-03 23:06:25

Recently Reported IPs

212.98.162.206 202.86.189.194 189.147.110.167 188.162.234.146
188.136.159.101 194.67.216.94 183.88.23.58 181.115.248.153
181.48.84.90 180.244.232.44 178.173.131.222 173.44.48.32
171.225.223.211 14.172.89.84 14.170.30.226 123.25.230.198
123.23.146.250 14.161.24.90 118.69.37.43 117.28.240.130